Skip to content
#

password-cracking

Here are 79 public repositories matching this topic...

bugrabklmz
bugrabklmz commented Jan 23, 2021

I testing bruteforce my opencart store.

this is body request:

-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="username"

^USER^
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="password"

^PASS^
-----------------------------34237939373614592773956005873
Content-Disposition: form-dat
Kaonashi
Sc00bz
Sc00bz commented May 6, 2019

You should order masks by efficiency (occurrences/key_space) because this will lead to the less guesses to crack passwords.

Looking at the top 5:
https://github.com/kaonashi-passwords/Kaonashi/blob/5239bd333ed34993b43126a4499606ba70086034/masks/kaonashi_masks_numbered.txt#L1-L5

And ordering just the 1000 in kaonashi_masks_numbered.txt by efficiency the top 5 are now:

673407:?u?u?u?u

Improve this page

Add a description, image, and links to the password-cracking topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the password-cracking topic, visit your repo's landing page and select "manage topics."

Learn more